首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - In this paper, we propose a reversible data hiding scheme using (5, 3) Hamming code. A cover image is partitioned into blocks of five pixels. An adjusted (5, 3)...  相似文献   

2.
Multimedia Tools and Applications - Recently, a reversible data hiding (RDH) scheme based on code division multiplexing (CDM) has been reported, in which secret information and pseudo bits are...  相似文献   

3.

In the digital world, watermarking technology is a solution for data hiding and completely essential for management and secure communications of digital data propagated over the internet-based platforms. Reversible watermarking is a quality-aware type of watermarking which has been applied in managing digital contents such as digital images, texts, audios and videos. Reversible watermarking is also known as lossless watermarking due to its preservation of all details of host and hidden data. One of the important uses of this kind of watermarking is to manage medical data regarding DICOM images. In the recent years, a new type of reversible watermarking technology entitled interpolation-based reversible watermarking has been introduced, and we are going to enhance it for DICOM images by using a hybrid approach based on computing error histogram and by applying an image interpolation with greedy weights (adaptive weighting). In practice, simulation results clearly show better performance of the proposed scheme compared to the previous techniques using interpolation-based reversible watermarking on different DICOM images.

  相似文献   

4.
Nowadays, the transmission of digitized medical information has become very convenient due to the generality of Internet. Regardless of the prevention of medical fault, the real-time detection of abnormal event, the support of clinical decision, even the model developing of medical service based on patient, Internet has created the biggest benefit to achieve the goals of promoting patient safety and medicine quality. However, it is easier that the hackers can grab or duplicate the digitized information on the Internet. This will cause following problems of medical security and copyright protection. Therefore, the information hiding techniques are developed for protection of medical information and copyright. This paper proposes a multiple-layer data hiding technique in spatial domain. It utilizes a reduced difference expansion method to embed the bitstream in the least significant bits (LSBs) of the expanded differences. By using the reduced difference expansion method, we can embed a large amount of data in a medical image whose quality can also be maintained. Moreover, the original image can be restored after extracting the hidden data from the stego-image. Experimental results show that the proposed scheme provides higher embedding capacity at the same level image quality compared with Tian's difference expansion method.  相似文献   

5.
Data hiding in images has evolved as one of the trusted methods of secure data communication and numerous approaches have been introduced over the years using gray scale images as the cover media. Most of the methods are based on data hiding in least significant bit planes of cover images. Many such methods purely depend on data substitution algorithms by defining a pattern in which data is embedded. One can gain access to the secret data in a few attempts, if the algorithm is known. Keeping this in view several approaches based on secret keys have also been proposed by researchers. This paper proposes an efficient data embedding scheme using a key and an embedding pattern generated through midpoint circle generation algorithm. The pattern can be applied to a carrier that is mapped onto a grid/image. The cryptosystem uses the concept of steganography and is computationally light and secure. The secret-key is generated in such a way that Avalanche effect is ensured except in very rare cases. The proposed data embedding method is shown to be robust and highly secure while maintaining good hiding capacity and imperceptibility. It is applicable for data hiding in a generic grid that could be of pixels or bits.  相似文献   

6.
7.

In this paper we have proposed an LSB based data hiding method. Here, first cover image is encoded by LBP based method (call as ELBP). In ELBP method, a 3 × 3 block is encoded by k bits (1 ≤ k ≤ 9) respect to the central pixel. For data hiding purpose, the cover image is encoded by ELBP then r (1 ≤ r < k) bits are embedded into each neighbor pixel by replacing least r bits of the encoded stream and then modified pixel is processed by OPAP method to improve the quality of the stego image. Proposed method gives high quality stego images with higher embedding rate compare to the state-of-the-art methods. The security of the proposed data hiding method is tested against the attacks like RS steganalysis and Chi-square attack and these methods fail to detect hidden data.

  相似文献   

8.
Multimedia Tools and Applications - In this paper, an improved reversible data hiding (RDH) scheme, best neighboring coding (BNC), is proposed for vector quantization (VQ) compressed color images....  相似文献   

9.
Multimedia Tools and Applications - In this paper, we propose a new dual-image based reversible data hiding scheme through (7,4) Hamming code (RDHHC) using shared secret key. A block of seven...  相似文献   

10.
11.
Yang  Yang  Zhang  Weiming  Liang  Dong  Yu  Nenghai 《Multimedia Tools and Applications》2018,77(14):18043-18065
Multimedia Tools and Applications - In this paper, we attempt to investigate the secure archiving of medical images which are stored on semi-trusted cloud servers, and focus on addressing the...  相似文献   

12.
Numerous data hiding schemes have been recently proposed based on section-wise strategy. The purpose of these approaches is to enhance security by using a unique key to generate a table. But these approaches are not matched between the embedding secret data length for binary bits and the length of the notation system in the section-wise strategy. In order to enhance the security of secret data and increase embedding capacity, we will propose a secure multi-group data hiding scheme based on General Exploiting Modification Direction (GEMD) map in this paper. Three major advantages exist in our scheme. First is flexibility for the number and combination of elements. Second is the removal of spatial redundancy in our method while maintaining embedding capacity above 1 bpp. Lastly, this method avoids the overflow/underflow problem. Experimental results show that our method enhances embedding capacity and maintains good visual stego image quality. In terms of security, the proposed scheme is more secure than LSB replacement method in terms of resisting visual attack and RS testing.  相似文献   

13.
In this paper, a new reversible data hiding method based on sorting and prediction in digital images is proposed. The proposed method can embed two bits in the 3 × 1 sub-block at maximum by dividing into two groups - min and max groups. The pixel pairs of the min group and max group are firstly predicted and then are modified to embed the secret bits. The reversibility is guaranteed since the order of pixel pairs of the sub-block is not changed after embedding a secret bit into two groups. The experimental results show that the proposed method provides high embedding capacity than the previous works.  相似文献   

14.
Liu  Li  Wang  Lifang  Chang  Chin-Chen 《Multimedia Tools and Applications》2017,76(20):20833-20846
Multimedia Tools and Applications - A novel semantic compression based on vector quantization (VQ) and data hiding is proposed. A compact version of the original image is generated, and then, VQ...  相似文献   

15.
Since the difference expansion (DE) technique was proposed, many researchers tried to, improve its performance in terms of hiding capacity and visual quality. In this paper, a new scheme, based on DE is proposed in order to increase the hiding capacity for medical images. One of the characteristics of medical images, among the other types of images, is the large smooth regions. Taking advantage of this characteristic, our scheme divides the image into two regions; smooth region and non-smooth region. For the smooth region, a high embedding capacity scheme is applied, while the original DE method is applied to the non-smooth region. Sixteen DICOM images of different modalities were used for testing the proposed schemes. The results showed that the proposed scheme has higher hiding capacity compared to the original schemes.  相似文献   

16.
In this paper, a capacity promoting technique is proposed for embedding data in an image using pixel-value differencing (PVD). The PVD scheme embeds data by changing the difference value between two adjacent pixels so that more data is embedded into two pixels located in the edge area, than in the smooth area. In order to increase the embedding capacity, a new approach is proposed in this paper by searching edge area more flexibly. Instead of processing a pair of pixels at a time as proposed by Wu and Tsai, two pairs of pixels in a block are processed at the same time. In addition, we proposed a pixel-value shifting scheme to further increase the chances for embedding data. Our scheme exploits the edge areas more efficiently, thus leading to an increase in embedding capacity as shown by experimental results compared to Wu and Tsai's method. Also, the embedding result of our scheme passes the Fridrich et al.’s detection. Besides, according to the distribution of difference values, more practical range partitions are suggested for improving capacity.  相似文献   

17.

In this work, an active forgery detection scheme is proposed to locate the tampered region from a forged digital image. In this regard, an authentication code is formed and subsequently, the same is concealed into each pixel for the realization of a fragile watermarked image. In an active forgery detection procedure, the extracted authentication code from the fragile watermarked image is considered to detect the tampered region properly. The main goal of this work is to generate a secure authentication code for preventing the attackers from purposely altering the embedded code to match the tampered image contents as well as to cause less visual distortion after the construction of the fragile watermarked image. Initially, the authentication code for each pixel is computed using Hamming code from the first four most significant bits (MSBs) and subsequently, the same is considered to conceal into some least significant bits (LSBs) of that particular pixel. Generally, the LSB components are found visually insignificant so, the suggested pixel-level authentication code embedding procedure retains the high visual quality of the watermarked image. The proposed fragile watermarking is secured since the authentication code embedding procedure is realized using the logistic-map based generated secret parameters. The proposed scheme has been implemented and the results based on the input of several grayscale images are found satisfactory. In addition, several tampered images are considered to validate the proficiency of tampering detection of the proposed work. The obtained results demonstrate that the presented work is effectively capable to detect the tampered region even in pixel-level from the forged digital image content and also the results are found comparable to some related works.

  相似文献   

18.
In data hiding, pixel-value differencing and least significant bit are well-known techniques to embed secret data. In this paper, a novel data hiding scheme is proposed to provide high embedding capacity. In case of previous methods, pixel-value differencing and least significant bit techniques were used individually or in combination based on pixel, but the proposed method utilizes first by dividing the bit region and two schemes are used simultaneously in the same bit plane. The experimental results show that the proposed method has strength on embedding capacity maintaining visual image quality without distortion to the human eyes.  相似文献   

19.
20.
Farrag  Sara  Alexan  Wassim 《Multimedia Tools and Applications》2020,79(39-40):29289-29303
Multimedia Tools and Applications - Due to its powerful ability to conceal secret data inside an unsuspicious cover object, image steganography has emerged as an active field of research. Recently,...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号